International Journal of Computer Science and Network Security

Displaying 1-40 of 349 results

"Cloud computing has been proved as a boon to distributed computing over a network, having ability to run a program on many connected computing at a same time. It is network based service provided by real server hardware, in fact served by virtual network. It is essential for using any...

Provided By International Journal of Computer Science and Network Security

"Cloud computing is the latest technology used by many organizations in this competitive world. As many organizations are using cloud computing technology, the major issue is resource allocation as pay-per-use on demand basis. In cloud environments, efficient resource provisioning and management is a challenging issue because of the dynamic nature...

Provided By International Journal of Computer Science and Network Security

"Distributed environments are becoming more popular as these technologies such as mobile and ad hoc networks, aim to enable large scale cooperation for resource sharing framework. Secure authentication is the challenging issue for such environments. The authors studied the role of threshold cryptography in securing the MANETs, revealing the authorization...

Provided By International Journal of Computer Science and Network Security

"Wireless sensor networks have been the source of increasing interest for researchers because they gather information from multiple sources at the same time. This technology allows small sensors to be distributed across a geographical region to collect data, which is sent to a main server via a routing algorithm to...

Provided By International Journal of Computer Science and Network Security

Recently, Wireless Mesh Networks (WMNs) have gained significant roles in communication technologies and have been used in many applications with high sensitivity to packet loss, delay and transmission time. Therefore, many researchers paid their attention for solving WMNs related issues. The WMN consists of Mesh Routers (MRs) and Mesh Clients...

Provided By International Journal of Computer Science and Network Security

Wireless support is now available in most devices. Streaming video over networks is a big challenge that faced by most companies working in technology development. Giving the best quality and high throughput performance is an ongoing issue. The quality depends on many factors likes bound rates and stringency of the...

Provided By International Journal of Computer Science and Network Security

With computer systems increasingly under attack, information security is more serious in user views. Security protects computer and everything associated with it including networks, terminals, printers, cabling, and disks and most important, it protects the available information in this environment. Technical solutions, introduced by policies and implantations are essential requirements...

Provided By International Journal of Computer Science and Network Security

Information and Communication Technologies (ICT) and Electronic Commerce (EC) are flourishing dramatically. Furthermore, using electronic ticket is possible to reduce the costs of ticket management for companies and users. The business organizations have been restlessly evaluating the revenue potential of the electronic tickets market and exploit the profit potential of...

Provided By International Journal of Computer Science and Network Security

Cloud computing is a new IT model that, just like electricity and water, which were firstly generated at home and evolved to be supplied from utility providers, aims to transform computing resources sharing into an utility. This enables startups and other companies to start computing services without having to invest...

Provided By International Journal of Computer Science and Network Security

Infrastructured network consists of fixed base stations while communications take place using technique handoff. It connects with new base station and start communication when mobile goes out of range of one base station. Advantages over ad-hoc networks are efficiently utilized network resources and single-hop routes, results in: lower delay and...

Provided By International Journal of Computer Science and Network Security

Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed now-a-days (but systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of...

Provided By International Journal of Computer Science and Network Security

Mobile Ad hoc NETworks (MANETs) are characterized by the absence of fixed infrastructure, rapid topology change and high node mobility. These characteristics determine that wireless ad hoc network is more vulnerable to malicious attacks than the traditional Internet. Among many malicious attacks, a novel method is proposed to eliminate black...

Provided By International Journal of Computer Science and Network Security

Data Compression can be defined as encoding the information using the small number of bits rather than original representation. There are two types of data compression, lossless and lossy compression. Compression is a technique used for reducing data size by manipulating data redundancy; so that the packet transmission time and...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors present the margin adaptive resource allocation using full CSIT (Channel State InformaTion) and statistical CSIT in OFDMA systems. In the past, Monte-Carlo snap-shots in the MA problem is far too complex, an analytical expression of the outage capacity as a function of the Signal-to-Noise Ratio...

Provided By International Journal of Computer Science and Network Security

Network intrusion awareness is important factor for risk analysis of network security. In the current decade various method and framework are available for intrusion detection and security awareness. Some method based on knowledge discovery process and some framework based on neural network. These entire model take rule based decision for...

Provided By International Journal of Computer Science and Network Security

Clustering is one of the major tasks in the field of data mining. The main aim of the clustering is grouping the data or similar objects into one group based on their data find the similarity between the objects. Clustering of uncertain data have been becoming the major issues in...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors present an innovative solution to the old problem of password security at application layer or input level. In their solution, each of the various lower case & upper case characters, special characters, digits from which a password could be comprised is encoded with a random...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors propose a new one-way hash algorithm, which is also obtains better efficiency and security, compared with a particular conventional hash algorithm, hash algorithm can be used to determine if two values are equal, a hash function maps keys to small values. DILH algorithm using linear...

Provided By International Journal of Computer Science and Network Security

One of the major challenges in Mobile Ad hoc NETworks (MANETs) is link failure due to mobility. If the degree of mobility of any node in any route increases, the route lifetime decreases. That causes frequent link failures, and results more packet loss and low throughput. Packet loss requires packet...

Provided By International Journal of Computer Science and Network Security

The open nature of the wireless medium leaves it too weak to intentional interference attacks, typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting denial-of-service attacks on wireless networks. Typically, jamming has been introduced under an external threat model. However,...

Provided By International Journal of Computer Science and Network Security

Extracting summary from the documents is a difficult task for human beings. Therefore to generate summary automatically has to facilitate several challenges; as the system automates it can only extract the required information from the original document. This reduces the work to compress the original document and extract only essential...

Provided By International Journal of Computer Science and Network Security

Border security has become a high-priority issue in many countries around the world. The conventional border surveillance or petrol systems consist of check points and border troops but it does not provide the complete security. In addition to that smart fencing is a solution to extend the eyes and ears...

Provided By International Journal of Computer Science and Network Security

Artificial neural network is an interconnected group of natural or artificial neurons that uses a mathematical or computational model for information processing based on a connectionist approach to computation. Neural network optimization based on three basic parameters topology, weights and the learning rate. The overfitting is a problem in NN...

Provided By International Journal of Computer Science and Network Security

Haptic technology, or haptics, is a tactile feedback technology which takes advantage of a user's sense of touch by applying forces, vibrations, and/or motions upon the user. This mechanical stimulation may be used to assist in the creation of virtual objects (objects existing only in a computer simulation), for control...

Provided By International Journal of Computer Science and Network Security

Human motion capturing has become an important tool in fields such as sports sciences, biometrics, and particularly in computer animation, where large collections of motion material are accumulated in the production process. Efficient storage, retrieval and transmission methods are needed to fully exploit motion databases for reuse and for the...

Provided By International Journal of Computer Science and Network Security

Simple way Linux is an operating system. It is the usage of software on a computer that enables applications and the computer operator to access the devices on the computer to perform desired function. Linux operating system is very similar to other operating systems such as windows and OS X....

Provided By International Journal of Computer Science and Network Security

Passwords are a common form of authentication and are often the only barrier between a user and their personal information. There are several programs attackers can use to help guess or \"Crack\" passwords, but by choosing good passwords and keeping them confidential, the user can make it more difficult for...

Provided By International Journal of Computer Science and Network Security

Third Generation (3G) systems develop faster communications services, including voice, fax and Internet, anytime and anywhere with seamless global roaming global standard for 3G has opened the way to enabling innovative applications and services multimedia entertainment, infotainment and location-based services, among other. 3G networks are getting day-by-day popular and they...

Provided By International Journal of Computer Science and Network Security

The fast change in the day-to-day activity need to analyze the intrusive data very accurately without losing performance. Intrusive behavior is critical for analyzing the data and performance is crucial in the computational environment, when the user requires accuracy in the results. Finding intrusive behavior in the network with accuracy...

Provided By International Journal of Computer Science and Network Security

In wireless sensor network, an attacker can capture sensor nodes and can compromise sensor nodes. Then would create duplicate nodes and built up various attacks using duplicate nodes, inserts into the network. This is happened because of unattended nature of wireless sensor network. These attacks helps attacker to control few...

Provided By International Journal of Computer Science and Network Security

Using the devaney chaos theory, designed a compound chaotic mapping as the encryption function, and had proven that the track was non-periodic for the initial value of a finite decimal. The authors have designed an encryption algorithm successively according to this, and realized the encryption for sound documents. Afterward the...

Provided By International Journal of Computer Science and Network Security

Encryption computational complexity and encryption speed are two important aspects of video encryption algorithms. Due to its increasingly large size, video images present a great challenge to currently available cryptographic algorithms; the processes of encryption and decryption of video images are so computationally intensive that they introduce delays beyond acceptable...

Provided By International Journal of Computer Science and Network Security

The versatile uses of Mobile Ad hoc NETworks (MANETs) have elicited everyone's attention and offer a lot of challenges to the researchers. Due to absence of central coordinators in ad hoc networks all the necessary actions are played by the individual node. Nodes major responsibility is routing and many routing...

Provided By International Journal of Computer Science and Network Security

Software architecture is identified as an important element in the successful development and evolution of software systems. In spite of the significant role of architecture representation and modeling, many existing software systems like legacy or eroded ones do not have a consistent architecture representation. There have been several algorithms on...

Provided By International Journal of Computer Science and Network Security

Recently, DASH (Dynamic Adaptive Streaming over HTTP) is gaining attention because it is possible to use an existing web server, and not be restricted by the firewall or NAT (Network Address Translator). However, the existing video quality adaptation methods for DASH do not consider the frequent change of video quality,...

Provided By International Journal of Computer Science and Network Security

Integrating Quality of Service (QoS) in a Mobile Ad-hoc NETwork (MANET) is a difficult challenge and a very tedious task. It requires finding a compromise between several QoS parameters. The energy criterion is one of the most important of these parameters that will provide a long lifetime for a given...

Provided By International Journal of Computer Science and Network Security

In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when person is driving and alerting the person when in sleepy mood will be quite useful. Human gestures can be identified by observing...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors provide a problem of automatically recognizing human faces from frontal views with various facial expressions, occlusion, illumination and pose. There are two underlying motivations for them to write this paper: the first is to provide an occlusion and various expressions of the existing face recognition...

Provided By International Journal of Computer Science and Network Security

Multiple Traveling Salesman Problems (MTSPs) are a typical computationally complex combinatorial optimization problem, which is an extension of the famous Traveling Salesman Problem (TSP). The MTSP can be generalized to a wide variety of routing and scheduling problems. The paper makes the attempt to show how Genetic Algorithm (GA) can...

Provided By International Journal of Computer Science and Network Security

Orthogonal Frequency Division Multiplexing (OFDM) is a modulation schema that due to the high spectral efficiency and the simplicity of the receiver implementation is the most common system for using in broadband communication systems. Although OFDM has been used in numerous wireless communication systems, but two of the main problems...

Provided By International Journal of Computer Science and Network Security

In cryptography, encryption is the process of transforming information referred to as plain-text using an algorithm (called a cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is information which is, referred to as cipher-text. Stream...

Provided By International Journal of Computer Science and Network Security

Today, many hardware and software solutions are available to enhance information security, however, little is known about the human factor in information security. Other researchers have revealed that the application of information security technologies alone does not always result in improved security. Human factors immensely contribute to the security of...

Provided By International Journal of Computer Science and Network Security

The benefits of cloud computing are clearly well known which include rapid deployment, ease of customization, reduce cost and low risks. However, some high profile security breaches confuse organizations as they attempt to deploy cloud services in their businesses. Although, the cloud service providers pitch the security of their services....

Provided By International Journal of Computer Science and Network Security

An information procuring and processing emerging technology Wireless Sensor Network (WSN) consists of low-cost and multifunctional resources constrain autonomous nodes. It communicates short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different...

Provided By International Journal of Computer Science and Network Security

Computer and network security are one of the most challenging topics in the Information Technology research community. Internet security is a significant subject that may affect a wide range of Internet users. People that use Internet to sell, buy and even to communicate needs their communications to be safe and...

Provided By International Journal of Computer Science and Network Security

This paper explains the authentication and encryption scheme used in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of...

Provided By International Journal of Computer Science and Network Security

In Wireless Sensors Networks (WSNs) the efficient use of the sensors' energy is a key point to extend the network lifetime and has been the center of attention by many researchers. Clustering formation is an important technique used to reduce the sensor's energy consumption. However, finding an optimal clustering in...

Provided By International Journal of Computer Science and Network Security

Mobile IP is the current standard proposed by IETF for mobility management in IP networks. Its importance increases if network is supporting multimedia applications. Mobile node communicates with a static Correspondent Node. The main consideration is when Mobile Node and Correspondent Node both are visiting beyond their home networks and...

Provided By International Journal of Computer Science and Network Security

In medical facilities, mobile devices provide the medium for remote diagnosis and information retrieval. Mobile devices aid medical personnel by allowing them to access information ubiquitously. The medical doctor or radiologist may use his mobile device to view patient's medical images. But security and privacy is the major issue for...

Provided By International Journal of Computer Science and Network Security

Wireless Sensor Networks (WSNs) as an emerging technology faces numerous challenges. Sensor nodes are usually resource constrained. Sensor nodes are also vulnerable to physical attacks or node compromises. As the projected applications for Wireless Sensor Networks range from smart applications such as traffic monitoring to critical military applications such as...

Provided By International Journal of Computer Science and Network Security

A Mobile Ad-hoc NETwork (MANET) is a spontaneous network that can be established with no fixed infrastructure. This means that all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes in the network. Its routing protocol has to be able to...

Provided By International Journal of Computer Science and Network Security

Wireless mesh networks are part of ad-hoc networks that have potential to deliver Internet broadband access, Wireless Local Area Network coverage and network connectivity for stationary or mobile host at low cost. The technique involves a network of wireless routers relaying each other's packets in a multi-hop fashion. In this...

Provided By International Journal of Computer Science and Network Security

A wireless mesh network can be seen as a special type of wireless ad-hoc network. A wireless mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area. A network with higher throughput will deliver better Quality...

Provided By International Journal of Computer Science and Network Security

Wireless Sensor Networks (WSNs) consists of low-cost and multifunctional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the...

Provided By International Journal of Computer Science and Network Security

In recent years, the need has grown for the use of distributed systems for use in different applications and this applications become used in many areas and as an example for the applications of distributed systems is the E-commerce transactions, E-commerce is a set of e-business such as sales, purchase...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors apply PCA for feature selection with Na?ve Bayes for classification in order to build a network Intrusion Detection System. For experimental analysis, KDDCup 1999 intrusion detection benchmark dataset have been used. The 2 class classification is performed. The experimental results show that the proposed approach...

Provided By International Journal of Computer Science and Network Security

SMS is one of the most widely used data applications in the world. Due to its easy availability and low cost, many enterprises have chosen to use SMS as the primary medium for dissemination of information and alerts. During high loads and traffic scenarios, the SMS latency tends to rise...

Provided By International Journal of Computer Science and Network Security

The multichannel operations IEEE 1609.4 are an emerging standard which support the co-existence of safety (CCH Channel) and non-safety (SCH Channel) message application in vehicular networks. This strictly concerns on the transmission slot synchronization of CCH/SCH based on Wireless Access in Vehicular Environments (WAVE) to achieve QoS requirements (i.e. to...

Provided By International Journal of Computer Science and Network Security

A pervasive network is one in which the estimation of the capability of the nodes to arrange themselves autonomously in the network environment and exchange information through these networks. All types of ad-hoc networks come under pervasive network. In this dynamically changing environment, the authors cannot provide security in the...

Provided By International Journal of Computer Science and Network Security

Currently, one of the major security issues in wireless environment is the intrusion coming from an unknown and unauthorized wireless access points. This access points could expose any sensitive information transmitted over the network. Until now the Intrusion Detection System (IDS) on wireless network environment is still being developed because...

Provided By International Journal of Computer Science and Network Security

Network-on-chip (NoC) technology enables a new system-on-chip paradigm, the System-on Network-on-Chip (SoNoC) paradigm. One of the challenges in designing application-specific networks is modeling the on-chip system behavior and determining on-chip traffic characteristics. A universal object message level model for SoNoC was defined and an object-oriented methodology was developed to implement...

Provided By International Journal of Computer Science and Network Security

Reliable and on-time data delivery is a crucial parameter of network performance in highly dynamic mobile ad hoc networks. Leveraging on a modified 802.11 MAC tweak, guard nodes relay the packet with prioritized back off time when the intended node fails and becomes a contender nodes themselves. Previously used ad...

Provided By International Journal of Computer Science and Network Security

Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it provides distribution of computing resources. This distribution results in cost and energy reduction, thus making efficient utilization of physical resources. Thus resource...

Provided By International Journal of Computer Science and Network Security

Recent advances in low-power computing and communication technologies have given rise to the proliferation of wireless sensor networks having low cost sensor nodes with limited processing capacity and battery power. Wireless sensor networks can be used in a wide range of applications such as industrial process monitoring and control, surveillance...

Provided By International Journal of Computer Science and Network Security

Many celebrities and experts from various fields may have been referred by not only their personal names but also by their aliases on web. Aliases are very important in information retrieval to retrieve complete information about a personal name from the web, as some of the web pages of the...

Provided By International Journal of Computer Science and Network Security

Integrating Quality of Service (QoS) in a Mobile Ad-hoc NETwork (MANET) is a difficult challenge and a very tedious task. It requires finding a compromise between several QoS parameters. The energy criterion is one of the most important of these parameters that will provide a long lifetime for a given...

Provided By International Journal of Computer Science and Network Security

In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when person is driving and alerting the person when in sleepy mood will be quite useful. Human gestures can be identified by observing...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors provide a problem of automatically recognizing human faces from frontal views with various facial expressions, occlusion, illumination and pose. There are two underlying motivations for them to write this paper: the first is to provide an occlusion and various expressions of the existing face recognition...

Provided By International Journal of Computer Science and Network Security

Multiple Traveling Salesman Problems (MTSPs) are a typical computationally complex combinatorial optimization problem, which is an extension of the famous Traveling Salesman Problem (TSP). The MTSP can be generalized to a wide variety of routing and scheduling problems. The paper makes the attempt to show how Genetic Algorithm (GA) can...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors review the detection of Distributed Denial of Service (DDoS) attack. This DDoS attacks could be detected using the existing machine learning techniques such as neural classifiers. These classifiers lack generalization capabilities which result in less performance leading to high false positives. This paper evaluates the...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors propose a system, which assigns trustiness certification to information technology equipment through a series of tests and evaluations. This system is based in a methodology that should be applied in a laboratory, which issues a technical report containing the results of all the methodology steps,...

Provided By International Journal of Computer Science and Network Security

An intrusion detection system is used to monitor network traffic, check for suspicious activities and notifies the network administrator or the system to operate in high speed networks, present network intrusion detection systems are either signature based or anomaly based system. These systems are inefficient and suffer from a large...

Provided By International Journal of Computer Science and Network Security

In this paper, the authors present a new approach using Hidden Marko Model as classifier and Singular Values Decomposition (SVD) coefficients as features for face recognition. As face is a complex multi-dimensional structure and needs good computing techniques for recognition and it is an integral part of biometrics. Features extracted...

Provided By International Journal of Computer Science and Network Security

Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

Provided By International Journal of Computer Science and Network Security

Face recognition mainly involves recognizing personal identity, based on statistical as well as geometrical features which are derived from face images .This paper presents an automated system for human face recognition in a real time background world for a large homemade dataset of persons face. The task is very difficult...

Provided By International Journal of Computer Science and Network Security

Push-to-Talk (PTT) is a well known service in the law enforcement and public safety communities, where coordination and spectral efficiency are key for efficient communication. Push-to-Talk (PTT) is a useful capability for rapidly deployable wireless mesh networks used by first responders. PTT allows several users to speak with each other...

Provided By International Journal of Computer Science and Network Security

Mobile systems, such as smart phones, have become the primary computing platform for many users. Smartphone's stimulate growth of Global Position Systems (GPS). However, Smartphone mobile computing faces challenges because of the limited battery capacity. Therefore, it is necessary to offload the computation-intensive part by careful partitioning of application functions...

Provided By International Journal of Computer Science and Network Security

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?